Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload
Search Results
Results: 1 through 50 of 64 (0.154 secs)
You searched for: subject:"national security agency"
[1] 2     Next    Last
[texts]National Security Agency: Untangling the Web 2007 - National Security Agency
National Security Agency: Untangling the Web A guide to Internet Research.  Declassified, apparently in 2013, original document apparently from 2007.Posted on http://cryptome.org/2013/05/nsa-web-research.zip Reposted here to help with searching.
Keywords: National Security Agency
Downloads: 1,691
[movies]National Security Agency Surveillance Programs : CSPAN : April 27, 2014 9:00pm-11:01pm EDT
Journalists discuss the media coverage of the National Security Agency's (NSA) surveillance program.
Keywords: National Security Agency Surveillance Programs; Television Program
[movies]National Security Agency Surveillance Programs : CSPAN : April 27, 2014 11:59pm-2:01am EDT
Journalists discuss the media coverage of the National Security Agency's (NSA) surveillance program.
Keywords: National Security Agency Surveillance Programs; Television Program
Downloads: 3
[movies]Future of the National Security Agency : CSPAN : June 7, 2014 7:00pm-7:46pm EDT
Mike Rigers discusses cybersecurity, the NSA and Edward Snowden.
Keywords: Future of the National Security Agency; Television Program
Downloads: 1
[audio]New World Notes 284 - Surveillance Then and Now - Kenneth Dowst
30-minute radio program for August 13, 2013. The National Security Agency & predecessors have been spying on Americans for 95 years. Features selections from a witty lecture on NSA history by James Bamford. Plus relevant music by Roy Zimmerman and Anne Feeney. Question: If NSA sometimes ignores orders from the President, who DO they report to? Originally broadcast as NWN #18 (June, 2008). Available now for the first time in the Internet Archive...
Keywords: James Bamford; surveillance; domestic spying; NSA; National Security Agency
Downloads: 201
[movies]National Security Agency and Privacy Debate : CSPAN : April 21, 2014 3:50am-5:51am EDT
Michael Hayden and Baron Gellman debate on the role of the NSA and privacy laws.
Keywords: National Security Agency and Privacy Debate; Television Program
Downloads: 6
[texts]Working At NSA: A Technology Perspective - National Security Agency
NSA recruitment video. Originally found here: http://www.nsa.gov/public_info/media_center/careers/video/WorkatNSATechPerspective/index.htmlTRANSCRIPT:Working at NSA: a Technology PerspectiveFacebook Recruiting(Piano Music)I'm a computer systems architect. I do human/computer interaction research for the Computer Information Sciences group. I'm a branch chief, so I manage a development team. I'm a mathematician - an applied research mathematician...
Keywords: NSA; recruitment; video; hipster; recruitment; video; National Security Agency
Downloads: 27
[movies]NSA Comedy Tour 2.0 By EthicsInTech Feb 20th - Vahid Razavi EthicsInTech
Peter ffoulkes, Research Director of Cloud Computing at 451 ResearchJustin Hall, Volunteer On Behalf of the NSA with Citizen Cloud InitiativeApril Glaser, Staff Member from the Electronic Frontier FoundationModerated By: Vahid Razavi, CEO of BizCloud & Founder of EthicsInTechFor Media inquiries please contact: http://EthicsInTech.com EthicsInTech™ in conjunction with BizCloud Presents "Got Ethics?" A fun, patriotic constitutional comedy focused on the NSA!  Followed by a drink mixer of Hacke...
Keywords: NSA Comedy; National Security Agency; EFF; NSA; Vahid Razavi; Justin Hall; DeveloperWeek
Downloads: 3
[audio]LISTen: An LISNews.org Program -- Episode #253 - The Air Staff of Erie Looking Productions
The regular episode for release on 2013-09-23
Keywords: lisnews; podcast; libraries; librarianship; politics; brazil; National Security Agency; Internet Balkanization; digital spying
Downloads: 21
[audio]LISTen: An LISNews.org Program -- Episode #247 - The Air Staff of Erie Looking Productions
The episode for regular release on 2013-06-16
Keywords: lisnews; podcast; libraries; librarianship; culture; retransmission; voice of america; national security agency; encryption; GnuPG; Mark Steyn
Downloads: 7
[texts]BOUNDLESSINFORMANT Frequently Asked Questions
This document, "BOUNDLESSINFORMANT Frequently Asked Questions," was first released by the Guardian newspaper on June 8, 2013 at this web site: http://www.guardian.co.uk/world/interactive/2013/jun/08/boundless-informant-nsa-full-text
Keywords: BOUNDLESSINFORMANT; Boundless Informant; National Security Agency (NSA); Surveillance; Guardian; Signals Intelligence (SIGINT); Edward Snowden; Glenn Greenwald
Downloads: 50
[audio]Burning Circle Episode 117 - The Air Staff of Erie Looking Productions
The episode for release on 2013-06-10
Keywords: ubuntu; ubuntu ohio; linux; burning circle; podcast; retransmission; voice of america; national security agency
Downloads: 53
[audio]WDFP Radio - The Denise Simon Experience - January 23, 2014 - TOPIC: The NSA knows EVERYTHING about YOU! - Stand Up America US
WDFP RadioThe Denise Simon ExperienceHosted by DENISE SIMONThis week's Topic:  The NSA knows EVERYTHING about YOU!  And Denise explains how and why...Official Site:  www.WDFP.usVisit us on Facebook:  www.facebook.com/TheRealCowboyLogic
Keywords: NSA; National Security Agency; privacy; spying; Denise Simon; SUA; Donna Fiducia; Don Neuen
Downloads: 8
[texts]Origins of the National Security Agency 1940-52 - Center for Cryptologic History, U.S. National Security Agency (NSA)
This is a copy of "Origins of the National Security Agency 1940-52," a history written by Thomas L. Burns of the Center for Cryptologic History at the National Security Agency. It was declassified on September 8, 2004, and released on the website memoryhole.org. It is being republished here because memoryhole.org is no longer online.Another, less-redacted version of the report, declassified three years later in 2007, is available on the NSA's web site: http://www.nsa.gov/public_info/_files/crypt...
Keywords: National Security Agency (NSA); Center for Cryptologic History; Thomas L. Burns; Memoryhole.org
Downloads: 90
[texts]BOUNDLESSINFORMANT: Describing Mission Capabilities from Metadata Records
The four slides in this powerpoint, "BOUNDLESSINFORMANT: Describing Mission Capabilities from Metadata Records," were first released by the Guardian newspaper on June 8, 2013 at this web page: http://www.guardian.co.uk/world/interactive/2013/jun/08/nsa-boundless-informant-data-mining-slides
Keywords: Global Access Operations (GAO); National Security Agency (NSA); Guardian; BOUNDLESSINFORMANT; Boundless Informant; Edward Snowden; Glenn Greenwald
Downloads: 48
[movies]Full Video of NSA Comedy Night Produced By EthicsInTech - EthicsInTech, Vahid Razavi
http://EthicsInTech.com http://NSAComedy.com EthicsInTech™ presents a fun night of Comedy, Ethics & Technology to help protect the Fourth Amendment and our constitutional rights and freedoms. The goal of the event is to entertain, educate and bring to light issues concerning ethical use of technology and how it can help or curtail individual rights and freedoms. This holiday charity event is focused on increasing public awareness through expert panel discussions on how those rights are being v...
Keywords: NSA Comedy; NSA; National Security Agency; Will Durst; EthicsInTech; VFP; CodePink
Downloads: 88
[image]NSA "Global Heat" Map of Surveillance - U.S. National Security Agency
This is a "global heat" map of the relative quantity of intercepted communications around the world by the U.S. National Security Agency (NSA)'s BOUNDLESSINFORMANT program. It is part of a collection of documents leaked by former NSA contractor Edward Snowden, and was first published by the Guardian newspaper. This particular image is a copy of the one published by the German newspaper, Der Spiegel, here: http://www.spiegel.de/fotostrecke/photo-gallery-nsa-documentation-of-spying-in-germany-foto...
Keywords: BOUNDLESSINFORMANT; Boundless Informant; National Security Agency (NSA); Global Heat; Map; Surveillance; Edward Snowden; Der Spiegel
Downloads: 54
[image]NSA Powerpoint Slides on XKeyscore - U.S. National Security Agency (NSA)
This is a collection of slides from a U.S. National Security Agency (NSA) powerpoint presentation about its program, XKeyscore. The Guardian newspaper revealed the existence of XKeyscore on July 31, 2013, based on materials leaked to the newspaper by Edward Snowden. Guardian writer Glenn Greenwald described the program as a tool that "allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals....
Keywords: National Security Agency (NSA); Edward Snowden; XKeyscore; Guardian; Glenn Greenwald; Edward Snowden; Powerpoint; internet; surveillance
Downloads: 176
[audio]Building Bridges: A Victory Against NSA Surveillance - Mimi Rosenberg and Ken Nash
Building Bridges, the National Edition with Mimi Rosenberg & Ken Nash ****************** Obama Tried to Stop Judge From Path-Breaking Victory for Fourth Amendment Against NSA and Shows Flaw in Obama Arguments About 1979 Supreme Court Decision. with Brett Max Kaufman, ACLU National Security Project Ho, ho, ho itâs the holiday season and weâre calling, texting, emailing, and engaging in digital communication like never before, but at least, thanks to Edward Snowden who initiated a historic debat...
Keywords: Brett Max Kaufman; ACLU National Security Project; Edward Snowden; NSA; National Security Agency; Obama telephone surveillance; Judge Richard Leon
Downloads: 19
[texts]NSA Reports No Other Cryptolog Indices - Pamela N. Phillips
Response to FOIA request from Cryptome for indices of cryptologs.
Keywords: NSA; National Security Agency; FOIA; Freedom of Information Act; declassification; cryptography; John Young; Fort Meade; public records
Downloads: 33
[texts]NSA SIGINT Strategy Document - U.S. National Security Agency (NSA)
This U.S. National Security Agency (NSA) strategy document, leaked by Edward Snowden to Laura Poitras and Glenn Greenwald, was released to the public by the New York Times on November 22, 2013 here: http://www.nytimes.com/interactive/2013/11/23/us/politics/23nsa-sigint-strategy-document.html. It accompanied an article co-authored by Laura Poitras and James Risen, titled "N.S.A. Report Outlined Goals for More Power." In the February 23, 2012 document, the NSA outlines its strategy for the use of ...
Keywords: National Security Agency (NSA); New York Times; Laura Poitras; Edward Snowden; Signals Intelligence (SIGINT); James Risen; Strategy
Downloads: 31
[audio]LISTen: An LISNews.org Program -- Episode #246 - The Air Staff of Erie Looking Productions
The episode for release on 2013-06-10
Keywords: lisnews; podcast; libraries; librarianship; culture; retransmission; voice of america; national security agency; unemployment; generational issues; economic issues
Downloads: 24
[image]NSA Charts: Spying on European Countries - U.S. National Security Agency
These five graphs document the level of U.S. National Security Agency (NSA) intercepts of communication in five European countries during "the last 30 days" between Dec. 10, 2012 and Jan. 8, 2013: France, Germany, Italy, Netherlands, and Spain. The graphs indicate that tens of millions of communications were intercepted in each country during this one-month period by the NSA's BOUNDLESSINFORMANT program.These documents, leaked by former NSA contractor Edward Snowden, were first published by the ...
Keywords: National Security Agency (NSA); Edward Snowden; Der Spiegel; France; Germany; Italy; Netherlands; Spain; Boundless Informant; BOUNDLESSINFORMANT; Last 30 Days; graphs
Downloads: 41
[texts]Procedures Used by the National Security Agency for Targeting Non-United States Persons Reasonably Believed to be Located Outside the United States to Acquire Foreign Intelligence Information Pursuant to Section 702 of the Foreign Intelligence Surveillance Act of 1978, as Amended - Eric Holder, U.S. Attorney General
This document, "Procedures Used by the National Security Agency for Targeting Non-United States Persons Reasonably Believed to be Located Outside the United States to Acquire Foreign Intelligence Information Pursuant to Section 702 of the Foreign Intelligence Surveillance Act of 1978, as Amended," was first released by the Guardian newspaper on June 20, 2013 here: http://www.guardian.co.uk/world/interactive/2013/jun/20/exhibit-a-procedures-nsa-document
Keywords: Surveillance; National Security Agency (NSA); Foreign Intelligence Surveillance Act (FISA) of 1978; Guardian; Edward Snowden; Glenn Greenwald
Downloads: 45
[image]NSA Powerpoint Slides on BOUNDLESSINFORMANT
These 4 slides are from the powerpoint "BOUNDLESSINFORMANT: Describing Mission Capabilities from Metadata Records." They include the cover page and pages 3, 5, and 6 of the presentation. The powerpoint, leaked to the Guardian newspaper's Glenn Greenwald by Edward Snowden, was first released by the Guardian newspaper on June 8, 2013 at this web page: http://www.guardian.co.uk/world/interactive/2013/jun/08/nsa-boundless-informant-data-mining-slides Also included with this collection is a “heat m...
Keywords: National Security Agency (NSA); Edward Snowden; BoundlessInformant; Boundless Informant; Glenn Greenwald; Guardian; surveillance; internet; Global Access Operations (GAO)
Downloads: 85
[texts]Minimization Procedures Used by the National Security Agency in Connection with Acquisitions of Foreign Intelligence Information Pursuant to Section 702 of the Foreign Intelligence Surveillance Act of 1978, as Amended - Eric Holder, U.S. Attorney General
This document, "Minimization Procedures Used by the National Security Agency in Connection with Acquisitions of Foreign Intelligence Information Pursuant to Section 702 of the Foreign Intelligence Surveillance Act of 1978, as Amended", was first published by the Guardian newspaper on June 20, 2013 here: http://www.guardian.co.uk/world/interactive/2013/jun/20/exhibit-b-nsa-procedures-document
Keywords: National Security Agency (NSA); Minimization Procedures; Foreign Intelligence Surveillance Act (FISA) of 1978; Guardian; Edward Snowden; Glenn Greenwald
Downloads: 49
[image]NSA Powerpoint Slides on Cracking Smartphone Encryption - U.S. National Security Agency (NSA)
These are copies of National Security Agency (NSA) Powerpoint Slides released to the public by Der Spiegel here on September 9, 2013: http://www.spiegel.de/fotostrecke/photo-gallery-spying-on-smartphones-fotostrecke-101201.htmlIn the slides, one NSA powerpoint author ironically compares NSA surveillance to George Orwell's book 1984, and describes Apple founder Steve Jobs as "big brother" for enabling new kinds of data collection on iPhone users...
Keywords: National Security Agency (NSA); Powerpoint; Edward Snowden; Der Spiegel; Smartphone; Encryption; Blackberry; 1984; George Orwell; iPhone; Mexico; Surveillance; smart phone
Downloads: 104
[texts]Proposed Amendment to Department of Defense Procedures to Permit the National Security Agency to Conduct Analysis of Communications Metadata Associated with Persons in the United States - Kenneth Weinstein, Assistant U.S. Attorney General
This 2007 U.S. Attorney's Office memorandum RE "Proposed Amendment to Department of Defense Procedures to Permit the National Security Agency to Conduct Analysis of Communications Metadata Associated with Persons in the United States" had the purpose "To Recommend Attorney General approval pursuant to Executive Order 12333 of a Proposed Amendment to Procedures Governing the National Security Agency's Signals Intelligence Activities (S//SI)."It was first published online by the Guardian newspaper...
Keywords: National Security Agency (NSA); Attorney General; Executive Order 12333; Metadata; Signals Intelligence (SIGINT); Guardian; Edward Snowden; Glenn Greenwald
Downloads: 56
[texts]National Security Agency XKeyscore Presentation - United States National Security Agency
2008 presentation by United States National Security agency on formerly-secret NSA program that allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, acquired by The Guardian from whistleblower Edward Snowden and published by The Guardian in redacted form on July 31, 2013.
Keywords: comint; edward snowden; leaked; national security agency; nsa; presentation; spying; surveillance; the guardian; top secret; united states government; xkeyscore
Downloads: 160
[texts]The National Security Agency and Fourth Amendment Rights: Church Committee Hearings, Vol. 5 - U.S. Senate Subcommittee on Intelligence and the Rights of Americans of the Select Committee on Intelligence (Church Committee)
This is the fifth volume of hearing transcripts and exhibit copies published by the Subcommittee on Intelligence and the Rights of Americans of the Select Committee on Intelligence of the United States Senate (Church Committee). These hearings on “The National Security Agency and Fourth Amendment Rights" were held on October 29 and November 6, 1975, and the transcripts were published in 1976. A copy of this document may also be found on the web site of the U.S...
Keywords: National Security Agency (NSA); Church Committee; Hearings; Fourth Amendment; Project MINARET; Signals Intelligence (SIGINT); United States Intelligence Board (USIB)
Downloads: 81
[texts]Internet Domain Report for NSA FoxAcid 2ndHalfPlays.com - DomainTools
Historical record of Internet domain 2ndHalfPlays.com, reportedly used by United States National Security Agency as part of their "FoxAcid" program which aims to infect computers with malware to allow unauthorized access (i.e., "taylored access") by U.S. government staff. 
Keywords: computer; domain report; exploit; foxacid; fraud; internet domain; malware; national security agency; nsa; taylored access; unauthorized access; whois
Downloads: 73
[audio]Watching Big Brother As They Watch You - sgl
Inside the matrix with Tom Ashbrook and James Bamford. Author and journalist James Bamford on the vast new National Security Agency surveillance center going up in the Utah desert. Source: The NSAâs New Secret Spy Hub Scott Horton Interviews The Other Scott Horton The Other Scott Horton (no relation), international human rights lawyer, discusses former CIA boss Jose Rodriguezâs defense of torture and the destruction of interrogation videos (that he ordered)...
Keywords: Great Speeches And Interviews; Tom Ashbrook; James Bamford; National Security Agency; Scott Horton; The Other Scott Horton; CIA; Jose Rodriguez; Glenn Greenwald; democracy
Downloads: 38
[audio]Watching Big Brother As They Watch You - sgl
Inside the matrix with Tom Ashbrook and James Bamford. Author and journalist James Bamford on the vast new National Security Agency surveillance center going up in the Utah desert. Source: The NSAâs New Secret Spy Hub Scott Horton Interviews The Other Scott Horton The Other Scott Horton (no relation), international human rights lawyer, discusses former CIA boss Jose Rodriguezâs defense of torture and the destruction of interrogation videos (that he ordered)...
Keywords: Great Speeches And Interviews; Tom Ashbrook; James Bamford; National Security Agency; Scott Horton; The Other Scott Horton; CIA; Jose Rodriguez; Glenn Greenwald; democracy
Downloads: 28
[texts]National Security Agency procedures for minimizing data collected on USA citizens and residents - Eric Himpton Holder, Jr.
Minimization procedures used by the United States National Security Agency in connection with acquisitions of foreign intelligence information pursuant to section 702 of the Foreign Intelligence Surveillance Act of 1978, as amended Signed by United States Attorney General Eric H. Holder on January 28, 2009, and published by The Guardian on June 20, 2013
Keywords: attorney general; comint; eric holder; fisa; fisa court; intelligence; leaked; national security agency; noforn; nsa; spying; surveillance; the guardian; top secret; united states government
Downloads: 59
[audio]People Rise Up-12/20/06 - (NSA) Warrantless Eavesdropping One Year later - Andrew Geller
Touching base with Kurt Opsahl, Staff Attorney with the Electronic Frontier Foundation regarding their, and others', legal efforts to halt the warrantless wiretapping authorized (without legal basis) by the Bush administration.
Keywords: NSA; national security agency; wiretap; wiretapping; warrant; warrantless; Bush; spying; AT&T; Verizon; BellSouth; telephone; eavesdropping; email; communications; FBI; Attorney General
Downloads: 927
[audio]Watching Big Brother As They Watch You - sgl
Inside the matrix with Tom Ashbrook and James Bamford. Author and journalist James Bamford on the vast new National Security Agency surveillance center going up in the Utah desert. Source: The NSA's New Secret Spy Hub Scott Horton Interviews The Other Scott Horton The Other Scott Horton (no relation), international human rights lawyer, discusses former CIA boss Jose Rodriguez's defense of torture and the destruction of interrogation videos (that he ordered)...
Keywords: Great Speeches And Interviews; Tom Ashbrook; James Bamford; National Security Agency; Scott Horton; The Other Scott Horton; CIA; Jose Rodriguez; Glenn Greenwald; democracy
Downloads: 58
[texts]National Security Agency slides on Boundless Informant - United States National Security Agency
United States National Security Agency slides on NSA's Boundless Informant tool for counting and categorizing the records of communications (metadata), acquired by The Guardian and published by The Guardian on June 8, 2013.
Keywords: boundless informant; data mining; e-mail; explainer; leaked; metadata; national security agency; noform; nsa; si; sigint; spying; surveillance; the guardian; top secret; united states government
Downloads: 84
[texts]NSA Document: "Identity Intelligence: Image is Everything" - U.S. National Security Agency (NSA)
These are four slides that the New York Times excerpted from a U.S. National Security Agency (NSA) powerpoint presentation titled "Identity Intelligence: Image is Everything." The presentation was among a number of documents leaked to Laura Poitras by NSA contractor Edward Snowden, and was first published online here: http://www.nytimes.com/interactive/2014/06/01/us/nsa-document.htmlThe powerpoint slides define three types of information that the NSA collects "that are unique to an individual to...
Keywords: National Security Agency (NSA); Indentity; Intelligence; Surveillance; Facial Recognition; New York Times; Edward Snowden; Laura Poitras; Pinwale; Tide; Wellspring; PittPatt; Tundra Freeze
Downloads: 9
[audio]Obama's Secrets, Leaks & Surveillance - with Thomas Drake - Sounds of Dissent radio
In recent weeks the press has published harrowing details about the Obama Administration's drone and cyber-warfare campaigns, including President Obama's personal selection of suspected terrorists for inclusion in a CIA kill list. Outraged members of the U.S. Senate are now calling for hearings - not to investigate the exponential growth of an assassination program by an increasingly unaccountable executive branch, but to find and punish the leakers...
Keywords: Government secrecy; national security; state secrets; counterterrorism; terrorism; covert operations; surveillance; spy program; National Security Agency; Thomas Drake; whistleblowers; Espionage Act; John Kiriakou; classified information
Downloads: 40
[image]NSA Powerpoint Slides About U.S. Spying on Brazil and Mexico - U.S. National Security Agency (NSA)
This is a collection of National Security Agency (NSA) Powerpoint slides leaked by Edward Snowden to Glenn Greenwald, and published by the Brazilian news agency Fantástico. The slides appear to come from two different presentations. One presentation is titled "Intelligently Filtering Your Data: Brazil and Mexico Case Studies." It includes a slide that quotes text of "interesting messages" intercepted by the NSA-- excerpts of the private communication of Enrique Peña Nieto when he was a candida...
Keywords: Fantástico; National Security Agency (NSA); Brazil; Mexico; Edward Snowden; Glenn Greenwald; International Securities Issues (ISI); Combatting Proliferation; Counterterrorism; Enrique Peña Nieto; Dilma Rousseff; Signals Intelligence Directorate
Downloads: 151
[texts]National Security Agency procedures for targeting non-US persons believed to be located outside the USA - Eric Himpton Holder, Jr.
Procedures used by the United States National Security Agency for targeting non-United States persons reasonably believed to be located outside the United States to acquire foreign intelligence information pursuant to section 702 of the Foreign Intelligence Surveillance Act of 1978, as amended Signed by United States Attorney General Eric H. Holder on January 28, 2009, and published by The Guardian on June 20, 2013
Keywords: attorney general; comint; eric holder; fisa; fisa court; intelligence; leaked; national security agency; noforn; nsa; spying; surveillance; the guardian; top secret; united states government
Downloads: 72
[image]NSA Worldwide SIGINT/ Defense Cryptologic Platform - U.S. National Security Agency
This Powerpoint slide, produced by the U.S. National Security Agency (NSA) and leaked by former NSA contractor Edward Snowden, provides a visual representation of the NSA's "Defense Cryptologic Platform." The full title of the slide is "Driver 1: Worldwide SIGINT/ Defense Cryptologic Platform."The slide documents "20 access programs worldwide", some of them "covert" or "clandestine," to the internet's large, high-speed optic cables...
Keywords: National Security Agency (NSA); Edward Snowden; NRC Handelsblad; Special Collection Service; implants; computer network exploitation; FORNSAT; STELLAR; SOUNDER; SNICK; MOONPENNY; LADYLOVE; INDRA; IRONSAND; JACKKNIFE; CARBOY; TIMBERLINE; malware; spyware
Downloads: 143
[texts]Working Draft: National Security Agency Office of the Inspector General review of the President's Surveillance Program as mandated in the FISA Amendments Act of 2008 - Office of the Inspector General (OIG), U.S. National Security Agency (NSA)
According to the description of this "working draft", "This report provides the classified results of the NSA Office of the Inspector General (OIG) review of the President's Surveillance Program (PSP) as mandated in the FISA Amendments Act (FAA) of 2008." It was first released by the Guardian newspaper, and is also available here: http://www.guardian.co.uk/world/interactive/2013/jun/27/nsa-inspector-general-report-document-data-collection
Keywords: Office of the Inspector General (OIG); National Security Agency (NSA); President's Surveillance Program (PSP); FISA Amendments Act (FAA) of 2008; Guardian; Edward Snowden; Glenn Greenwald
Downloads: 46
[texts]National Security Agency factsheet on Boundless Informant - United States National Security Agency
United States National Security Agency factsheet on NSA's Boundless Informant tool for counting and categorizing the records of communications (metadata), acquired by The Guardian and published by The Guardian on June 8, 2013.
Keywords: boundless informant; dni; dnr; e-mail; factsheet; faq; leaked; metadata; national security agency; noforn; nsa; sigint; spying; surveillance; the guardian; top secret; united states government
Downloads: 92
[image]NSA PRISM Powerpoint Slides - U.S. National Security Agency (NSA)
These are copies of National Security Agency (NSA) powerpoint slides about its PRISM program, leaked by Edward Snowden. They come from two sources: -The Washington Post: http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/ -Le Monde: http://www.lemonde.fr/technologies/article/2013/10/21/espionnage-de-la-nsa-tous-les-documents-publies-par-le-monde_3499986_651865.html For additional NSA slides leaked by Edward Snowden, see: -XKeyscore: http://archive.org/details/NSA-Po...
Keywords: National Security Agency (NSA); PRISM; SIGAD US-984XN; Washington Post; Surveillance; Internet; FAIRVIEW; STORMBREW; BLARNEY; OAKSTAR; Edward Snowden; Glenn Greenwald
Downloads: 24,839
[texts]NSA Powerpoint Slides About U.S. Spying on France - U.S. National Security Agency (NSA)
These images are from U.S. National Security Agency (NSA) Powerpoint slides about its intelligence operations specifically as they relate to France. They were leaked by Edward Snowden to the journalist Glenn Greenwald, and first published online by Le Monde newspaper here: http://www.lemonde.fr/technologies/article/2013/10/21/espionnage-de-la-nsa-tous-les-documents-publies-par-le-monde_3499986_651865.html
Keywords: Edward Snowden; Glenn Greenwald; Le Monde; France; National Security Agency (NSA); Spying; Surveillance; Wanadoo; Alcatel-Lucent; PRISM; Orange; US-985D; DRTBOX; WHITEBOX; Upstream
Downloads: 833
[audio]A US-European Crisis Over Privacy Invasions? Part II - Peterson Institute for International Economics
Jacob Funk Kirkegaard says that European outrage over US spying will affect trade negotiations and limit the ability of US internet companies to operate freely in Germany, France, and elsewhere on the continent.
Keywords: Europe; European Union; Germany; France; privacy; internet surveillance; NSA; National Security Agency; United States international relations; transatlantic relations; trade relations; trade policy; trade negotiations; Jacob Kirkegaard; Peterson Institute for International Economics; PIIE
Downloads: 802
[texts]United States Cryptologic History, Series VI, Vol. 5: American Cryptology During the Cold War, 1945-89 - Thomas R. Johnson, Center for Cryptologic History, NSA
This is a digital copy of a four book series on the history of "American Cryptology During the Cold War, 1945-89," produced by the Center for Cryptologic History at the U.S. National Security Agency (NSA). They were declassified and released to the public in response to a Freedom of Information Act request from the National Security Archive at George Washington University. The history is just Vol. 5 of Series VI of United States Cryptologic History produced by the NSA...
Keywords: Interagency Security Classification Appeals Panel (ISCAP); National Security Agency (NSA); National Security Archive; History; Frank Church; Martin Luther King; Muhammad Ali; Whitney Young; Tom Wicker; Art Buchwald; Howard Baker
Downloads: 16
[audio]The Local Organon - Imperial Democracy - Local.org - The Local Organon
Imperial Democracy - Essays, News, and Music on Pax Americanabrought to you by The Local Organon - local.orgLive West Marin Radio - KWMR FM - Point Reyes and BolinasNews: Spy chiefs to run major universities? - UC Senate votes "no confidence" in new president and former U.S. domestic spying agency secretary; Fukushima fallout coming to California? Tokyo Electric is Godzilla!Essays: W.R. Baker - "Gardening at Night" and "The Desire for the New"; Paul Elmore - "Anomie in West Marin"; Paul Fenn -...
Keywords: Imperialism; United States; Death of the Republic; National Security Agency; Nuclear Power; Egypt; Syria; California; My Bloody Valentine; Mark Eitzel; Black Francis; Paul Fenn; Charles Schultz; W.R. Baker; Joseph Lough; Paul Elmore
Downloads: 7
[texts]National Security Agency Office of Inspector General Draft Report on President's Surveillance Program - United States National Security Agency Office of Inspector General
March 29, 2009, working draft of results of United States National Security Agency (NSA) Office of Inspector General (OIG) review of President's Surveillance Program. This document was acquired by The Guardian and published by The Guardian on June 27, 2013. On October 4, 2001, President George W. Bush issued a memorandum entitled, "Authorization for Specified Electronic Surveillance Activities During a Limited Period to Detect and Prevent Acts of Terrorism Within the United States." The memorand...
Keywords: comint; draft; email; george w bush; inspector general; internet; national security agency; noforn; nsa; oig; orcon; presidents surveillance program; psa; spying; stellar wind; stlw; surveillance; the guardian; top secret; united states government
Downloads: 183
[1] 2     Next    Last
Advanced search

Group results by:

> Relevance
Mediatype
Collection

Related mediatypes

texts
audio
image
movies